Software Engineering

The Human Factor in Cybersecurity

As a Chief Information Security Officer (CISO), a person needs to weigh the benefits and drawbacks of investing in more training versus purchasing new cybersecurity technologies to maximize their limited resources. In light of best practices supported by data, allocating a few resources wisely is essential for getting the most out of each dollar. The first step in improving cybersecurity is to recognize people’s role in it. Understanding the different perspectives on cybersecurity is crucial, especially among certain groups, as it might show the need for training and adjustments in behavior (Ramlo & Nicholas, 2021). It is also pointed out that most cyber mishaps are caused by human mistakes (Nobles, 2018). This highlights the importance of training in improving cybersecurity preparedness. To counter the constantly developing and sophisticated nature of cybersecurity assaults, especially those using social engineering techniques, it is recommended that funds be devoted to comprehensive cybersecurity awareness and training programs (Zhang et al., 2021).

At the same time, financial resources must be directed to technical advancements. The research by Valeria et al. (2023) highlights the need to develop new threat models that consider cyber, physical, and human factors. This highlights the need to invest in cutting-edge cybersecurity systems dealing with various attacks. According to (Kshetri, 2017), using blockchain technology may help improve cybersecurity since it has decentralized aspects that make it harder for hostile actors to manipulate or fabricate data.

Another study highlighted the relevance of senior management and proactive information security in improving cybersecurity (Kumar et al., 2020). Investing in cutting-edge cybersecurity products, including intrusion detection systems, endpoint protection, and encryption software, is necessary to strengthen the organization’s security architecture. In addition, the effects of cybersecurity on business output must be considered. This highlights the need to invest in cybersecurity solutions that reduce risk and boost resilience and productivity (Hasani et al., 2023) inside a business. Additionally, a vital component of the budget allocation plan entails creating strong incident response and recovery capabilities. Investing in systems that allow early identification, containment, and recovery from cyber events is crucial. Systems like security information and event management (SIEM) may help with this since they analyze security warnings as they come in from throughout the company in real time.

Setting aside funding for routine penetration testing and vulnerability assessments is essential. Using this preventative measure, vulnerabilities in the company’s systems and applications may be found and fixed before hackers can exploit them. It’s consistent with what cybersecurity experts recommend (Lee, 2020): a focus on constant development and preventative measures. The relationship between education and technology is not static but rather dynamic. In today’s ever-changing cybersecurity environment, it’s crucial to maintain a mindset of lifelong learning and adaptability. As a result, it is essential to set aside funds for regularly updating educational materials and technological answers. This ensures that all staff are up-to-date on the best cybersecurity procedures and that the company can withstand any new threats (Sallos et al., 2019).

In conclusion, as a CISO, a balanced approach to budget allocation requires understanding the interdependence of human factors and technology variables. Organizations may establish a synergistic defense against the multidimensional nature of cyber threats by investing in extensive training programs and cutting-edge cybersecurity solutions. This plan makes the most of the available resources and lays the groundwork for ongoing development and flexibility in the face of changing cybersecurity threats.

References

Hasani, T., O’Reilly, N., Dehghantanha, A., Rezania, D., & Levallet, N. (2023). Evaluating the adoption of cybersecurity and its influence on organizational performance. Sn Business & Economics, 3(5). https://doi.org/10.1007/s43546-023-00477-6.

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027-1038. https://doi.org/10.1016/j.telpol.2017.09.003.

Kumar, S., Biswas, B., Bhatia, M., & Dora, M. (2020). Antecedents for an enhanced level of cyber-security in organizations. Journal of Enterprise Information Management, 34(6), 1597-1629. https://doi.org/10.1108/jeim-06-2020-0240.

Lee, I. (2020). Internet of things (IoT) cybersecurity: literature review and IoT cyber risk management. Future Internet, 12(9), 157. https://doi.org/10.3390/fi12090157.

Sallos, M., Garcia-Perez, A., Bedford, D., & Orlando, B. (2019). Strategy and organisational cybersecurity: a knowledge-problem perspective. Journal of Intellectual Capital, 20(4), 581-597. https://doi.org/10.1108/jic-03-2019-0041.

Zhang, J., He, W., Li, W., & Abdous, M. (2021). Cybersecurity awareness training programs: a cost–benefit analysis framework. Industrial Management & Data Systems, 121(3), 613-636. https://doi.org/10.1108/imds-08-2020-0462.

Cite This Work

To export a reference to this article please select a referencing stye below:

SEARCH

WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message